-
Notifications
You must be signed in to change notification settings - Fork 295
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use GCP SA json for auth #1588
base: main
Are you sure you want to change the base?
Use GCP SA json for auth #1588
Conversation
@NaMNDV: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: NaMNDV The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Hi @NaMNDV. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
That's not it, we're moving jobs to either a GKE cluster running in kubernetes.io (SIG K8s Infra) or an EKS cluster running in SIG K8s Infra's accounts, just not GKE clusters in google.com, or any other company internal non-community-operated assets. full context: https://groups.google.com/a/kubernetes.io/g/dev/c/p6PAML90ZOU/m/11sDguoxAQAJ |
see also: #1583 |
@NaMNDV could you look at this? If you use the GKE cluster, you should be able to use workload identity? |
@NaMNDV ping on this! Have you had a chance to look at the required resources to re-enable CI? |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/kind migration
Testcase Migration for GCP Provider.
Partial revert of #641 to use GCP SA json as secret from GitHub Secrets and use that to authenticate GCP Secrets.
Since GCP Prow is migrating to EKS Prow, this is a temporary workaround to make sure the smooth transition of test cases, upon clarity we will build a permanent solution to use federated WI in EKS Prow.